Marten J. Van Sinderen | University of Twente (original) (raw)

Papers by Marten J. Van Sinderen

Research paper thumbnail of Service Commitments and Capabilities across the ArchiMate Architectural Layers

ArchiMate is a widely adopted enterprise architecture modeling language that includes the "servic... more ArchiMate is a widely adopted enterprise architecture modeling language that includes the "service" construct as a key structuring element across its enterprise layers. A previous analysis of the use of this construct within ArchiMate's business layer concluded that it fails to represent some important social aspects associated with the dynamics of service relations, which led to recommendations for improvements in the form of modeling patterns with focus on the business layer of ArchiMate. In this paper, we extend that analysis to consider also service relations in the application and technology layers. We explore the importance of addressing two complementary views for service modeling: the capability-based and the commitment-based views. As a result, a more comprehensive modeling strategy for service relations in ArchiMate is proposed; this strategy is able to reflect business models that employ the service notion, including software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS). We use a reference ontology for services (UFO-S) to support our analysis.

Research paper thumbnail of A commitment-based reference ontology for services

Information Systems, 2015

The concept of "service" has been characterized in different disciplines and by different authors... more The concept of "service" has been characterized in different disciplines and by different authors from various points of view. This variety of characterizations has emerged because although this notion seems intuitive, it is far from trivial, with many interrelated perspectives. Given their importance in enterprise computing and Service Science in general, we believe that a clear account of services and service-related concepts is necessary and would serve as a basis for communication, consensus and alignment among approaches and perspectives. In this paper we propose a commitment-based account of the notion of service captured in a core reference ontology called UFO-S. We address the commitments established between service providers and customers, and show how such commitments affect the service lifecycle. Moreover, we show that the commitment-based account can serve to harmonize different notions of service in the literature.

Research paper thumbnail of Towards a Commitment-Based Reference Ontology for Services

2013 17th IEEE International Enterprise Distributed Object Computing Conference, 2013

The concept of "service" has been characterized by different disciplines and authors from various... more The concept of "service" has been characterized by different disciplines and authors from various points of view. The variety of characterizations reveals that this notion, although an intuitive one, is far from trivial. Given the importance of services in enterprise computing and Service Science in general, we believe that a clear account of services and service-related concepts is necessary and would serve as a basis for communication, consensus and alignment of various approaches and perspectives. In this paper we propose a commitment-based account of the notion of service captured in a core reference ontology called UFO-S. We address the commitments established between service providers and customers, and show how such commitments affect the service lifecycle. We show that the commitment-based account can serve to harmonize different notions of service in the literature.

Research paper thumbnail of Digital IT Consulting Service Provisioning – A practice-driven platform architecture proposal

Although the digitization of their clients' business processes is one of the main areas of activi... more Although the digitization of their clients' business processes is one of the main areas of activity for IT consulting companies, the digitization of their own services is still largely absent. Even though we witness extensive use of digital tools, such as digital presentations or video meetings, in the daily work of IT consultants, the business is still very human-centric and dependent on their face-to-face interactions. This is not inherently a problem, yet it poses major challenges to the domain for which few solutions exist to date-the ubiquitous provisioning of digital IT consulting services with the help of digital consulting platforms. To mitigate this shortcoming, in this paper we propose an architecture design for a digital IT consulting platform. Using the design science methodology and based on high-level requirements elicited in an exploratory focus group study with 16 IT consulting practitioners, we derive data requirements, functional requirements, and quality requirements. Based on these requirements, we then propose necessary architectural components. The technology choices in the instantiation of our proposed architecture are illustrated in a realistic context. Our plan for follow-up evaluation is presented as well, along with our reflection on limitations and implications. With this work we make two main contributions: (a) catalog of derived requirements for a digital IT Consulting platform, and (b) a component-level architecture proposal of how a digital IT consulting platform can be designed.

Research paper thumbnail of A verification exercise relating to specification styles in LOTOS

The design of complex distributed systems can be supported by a methodology where several, increa... more The design of complex distributed systems can be supported by a methodology where several, increasingly implementation-oriented, formal specifications are successively developed. The relative verification of such specifications is discussed in this memorandum using some example specifications in LOTOS. It is claimed that the adoption of common specification styles can simplify the verification task. Two congruence laws which are not contained in the LOTOS standard are presented.

Research paper thumbnail of Preface : 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007 Enschede, The Netherlands, July 18-20, 2007 proceedings

Research paper thumbnail of Characterising the digital transformation of IT consulting services–Results from a systematic mapping study

IET Software, Jul 12, 2022

Currently, the digital transformation of the provisioning of IT consulting services to clients fo... more Currently, the digital transformation of the provisioning of IT consulting services to clients forces many companies to reinvent their business models. While the importance of digital transformation is well recognised, very little has been done until now to closely examine the concepts characterising this phenomenon in the domain of IT consulting. This paper aims at mapping out what is currently known in scientific literature about the digitalisation of IT consulting service provisioning and its characterising concepts and approaches. Analysing 20 selected articles, we identified 10 concepts characterising the digital IT consulting and 14 areas considered to be candidates for inclusion in the design of digital IT consulting services. Moreover, we found only one approach to the digitalisation of service provisioning that was empirically evaluated. We conclude that (i) the digital transformation is multifaceted and characterised through many aspects; (ii) digital IT consulting services are primarily explored from business perspective, while research of stakeholders' needs, technical requirements, and designs of relevant artefacts is scarce; (iii) while individual solutions and practices that worked in real-world contexts are reported, very little empirical evaluation was done. Finally, we reflected on the limitations and on the theoretical and practical implications of this work. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes.

Research paper thumbnail of Lotos Specification Style for OSI

Springer eBooks, 1995

The architecture of OSI is used to derive guidelines for writing LOTOS specifications of distribu... more The architecture of OSI is used to derive guidelines for writing LOTOS specifications of distributed systems. In particular, the architectural concepts that underlie service and protocol designs are examined in detail. For each of these concepts a representation in LOTOS is given. Examples are provided of how the LOTOS representations of the concepts are used in the construction of LOTOS specifications of service and protocol designs. The approach described in this paper is motivated by the need to produce distributed system specifications in a more consistent and productive fashion.

Research paper thumbnail of Towards model-driven service-oriented enterprise computing

Enterprise Information Systems, Aug 1, 2009

ABSTRACT The definition and management of access rules (e.g. to control access to business docume... more ABSTRACT The definition and management of access rules (e.g. to control access to business documents and business functions) is a fundamental task in any enterprise information system (EIS). While there exists considerable work on how to specify and represent ...

Research paper thumbnail of Using P3P in a web services-based context-aware application platform

Research paper thumbnail of Visual Description of Digital IT Consulting Services Using DITCOS-DN: Proposal and Evaluation of a Graphical Editor

Research paper thumbnail of What Industry Wants from Requirements Engineers in China?

Background] Publications on the professional occupation of Requirements Engineering (RE) reported... more Background] Publications on the professional occupation of Requirements Engineering (RE) reported on market demands for both RE and non-RE qualifications and indicated the state-of-the-practice of RE roles in industry. However, prior research was not from the perspective of the RE area in the Software Engineering Body of Knowledge (SWEBOK). Nor, they shed light on the industry needs of RE professionals in China. [Aims] This paper focused on RE-specific tasks and skills sought after in China, from the perspective of RE activities elaborated in SWEBOK. [Method] Using an empirical qualitative research method, we selected and analyzed 535 job ads from China's two largest job portals. Job titles and descriptions of these ads were analyzed to uncover RErelevant responsibilities in the categories of RE activities in SWEBOK as well as RE skills. [Results] We identified the qualifications, experience and skills demanded by Chinese employers. Specifically, we reported 23 RE tasks demanded in the 535 job ads, from the perspective of SWEBOK RE activities. [Conclusion] Our findings reveal that in China's job market, 'requirements engineer' is explicitly used as a title of job ads. Plus, around 78% of the selected job positions want the employees to perform tasks in requirements elicitation. Editing requirements specification is the most in-demand

Research paper thumbnail of An Information Security Architecture for Smart Cities

Lecture notes in business information processing, 2018

The growing use of ICT in public life has coerced the concept of smart cities. In a smart city, n... more The growing use of ICT in public life has coerced the concept of smart cities. In a smart city, numerous physical devices coupled with latest ICT technologies are used by city authorities to provide better services and infrastructure to its citizens. Smart cities have unique security challenges. Owing to the involvement of numerous stakeholders, information security breaches can have wide ranging, long-lasting consequences. The challenges of smart city information security have not received the attention they deserve. This paper combines threat analysis and enterprise architecture modelling to address and mitigate these challenges from a holistic perspective. An information security architecture is presented, which can help stakeholders of the smart city projects to build more secure smart cities.

Research paper thumbnail of On the design of application protocols

Page 1. On the Design of Application Protocols Marten van Sinderen CTIT Ph. D-thesis series No. 9... more Page 1. On the Design of Application Protocols Marten van Sinderen CTIT Ph. D-thesis series No. 95-04 PO Box 217 - 7500 AE Enschede - The Netherlands telephone +31-53-893779 / fax +31-53-333815 Centre for Telematics and Information Technology Page 2. ...

Research paper thumbnail of Challenges and solutions in enterprise computing

Enterprise Information Systems, Nov 1, 2008

Research paper thumbnail of CoolTeD: A tool for co-labeling and visual analysis of textual dataset

Science of Computer Programming, Apr 1, 2023

Research paper thumbnail of De applicatie laag

Research paper thumbnail of Generic Protocol Specification Structures and Constructs

Research paper thumbnail of Augmenting App Review with App Changelogs: An Approach for App Review Classification

Proceedings, Jul 10, 2019

Recent research on the automatic classification of app reviews either focused on grouping app rev... more Recent research on the automatic classification of app reviews either focused on grouping app reviews into categories relevant to software evolution, or employed app reviews as the only research data to improve app reviews classification. Although it was reported that app review classification can benefit from supplementing user reviews with the data from other sources, only a few studies employed app changelogs for this purpose. This paper explores how to augment app reviews with changelogs to improve the accuracy and performance of classifying functional and non-functional requirements in app reviews. Specifically, we propose AUG-AC as an approach to extract feature words from app changelogs and construct the augments for app reviews. Next, we designed a series of experiments to evaluate our approach, varying in the length of AC-based augments for app reviews. The results show that AUG-AC outperforms the existing method by using app changelogs as a source of data next to app reviews.

Research paper thumbnail of RoseMatcher: Identifying the impact of user reviews on app updates

Information & Software Technology, Sep 1, 2023

Context: The release planning of mobile apps has become an area of active research, with most stu... more Context: The release planning of mobile apps has become an area of active research, with most studies centering on app analysis through release notes in the Apple App Store and tracking user reviews via issue trackers. However, the correlation between these release notes and user reviews in App Store remains understudied. Objective: In this paper, we introduce RoseMatcher, a novel automatic approach to match relevant user reviews with app release notes and identify matched pairs with high confidence. Methods: We collected 944 release notes and 1,046,862 user reviews from 5 mobile apps in the Apple App Store as research data to evaluate the effectiveness and accuracy of RoseMatcher, and conducted deep content analysis on matched pairs. Results: Our evaluation shows that RoseMatcher can reach a hit ratio of 0.718 for identifying relevant matched pairs, and with the manual labeling and content analysis of 984 relevant pairs, we identify 8 roles that user reviews play in app updates according to the relationship between release notes and user reviews in the relevant matched pairs. Conclusions: Our findings indicate that both app development teams and users pay close attention to release notes and user reviews, with release notes typically addressing feature requests, bug reports, and complaints, and user reviews offering positive, negative, and constructive feedback. Overall, the study highlights the importance of the communication between app development teams and users in the release planning of mobile apps, with relevant reviews tending to be posed within a short period before and after the release of release notes, with the average time interval between the post time of release notes and user reviews being approximately one year.

Research paper thumbnail of Service Commitments and Capabilities across the ArchiMate Architectural Layers

ArchiMate is a widely adopted enterprise architecture modeling language that includes the "servic... more ArchiMate is a widely adopted enterprise architecture modeling language that includes the "service" construct as a key structuring element across its enterprise layers. A previous analysis of the use of this construct within ArchiMate's business layer concluded that it fails to represent some important social aspects associated with the dynamics of service relations, which led to recommendations for improvements in the form of modeling patterns with focus on the business layer of ArchiMate. In this paper, we extend that analysis to consider also service relations in the application and technology layers. We explore the importance of addressing two complementary views for service modeling: the capability-based and the commitment-based views. As a result, a more comprehensive modeling strategy for service relations in ArchiMate is proposed; this strategy is able to reflect business models that employ the service notion, including software-as-a-service (SaaS), platform-as-a-service (PaaS), and infrastructure-as-a-service (IaaS). We use a reference ontology for services (UFO-S) to support our analysis.

Research paper thumbnail of A commitment-based reference ontology for services

Information Systems, 2015

The concept of "service" has been characterized in different disciplines and by different authors... more The concept of "service" has been characterized in different disciplines and by different authors from various points of view. This variety of characterizations has emerged because although this notion seems intuitive, it is far from trivial, with many interrelated perspectives. Given their importance in enterprise computing and Service Science in general, we believe that a clear account of services and service-related concepts is necessary and would serve as a basis for communication, consensus and alignment among approaches and perspectives. In this paper we propose a commitment-based account of the notion of service captured in a core reference ontology called UFO-S. We address the commitments established between service providers and customers, and show how such commitments affect the service lifecycle. Moreover, we show that the commitment-based account can serve to harmonize different notions of service in the literature.

Research paper thumbnail of Towards a Commitment-Based Reference Ontology for Services

2013 17th IEEE International Enterprise Distributed Object Computing Conference, 2013

The concept of "service" has been characterized by different disciplines and authors from various... more The concept of "service" has been characterized by different disciplines and authors from various points of view. The variety of characterizations reveals that this notion, although an intuitive one, is far from trivial. Given the importance of services in enterprise computing and Service Science in general, we believe that a clear account of services and service-related concepts is necessary and would serve as a basis for communication, consensus and alignment of various approaches and perspectives. In this paper we propose a commitment-based account of the notion of service captured in a core reference ontology called UFO-S. We address the commitments established between service providers and customers, and show how such commitments affect the service lifecycle. We show that the commitment-based account can serve to harmonize different notions of service in the literature.

Research paper thumbnail of Digital IT Consulting Service Provisioning – A practice-driven platform architecture proposal

Although the digitization of their clients' business processes is one of the main areas of activi... more Although the digitization of their clients' business processes is one of the main areas of activity for IT consulting companies, the digitization of their own services is still largely absent. Even though we witness extensive use of digital tools, such as digital presentations or video meetings, in the daily work of IT consultants, the business is still very human-centric and dependent on their face-to-face interactions. This is not inherently a problem, yet it poses major challenges to the domain for which few solutions exist to date-the ubiquitous provisioning of digital IT consulting services with the help of digital consulting platforms. To mitigate this shortcoming, in this paper we propose an architecture design for a digital IT consulting platform. Using the design science methodology and based on high-level requirements elicited in an exploratory focus group study with 16 IT consulting practitioners, we derive data requirements, functional requirements, and quality requirements. Based on these requirements, we then propose necessary architectural components. The technology choices in the instantiation of our proposed architecture are illustrated in a realistic context. Our plan for follow-up evaluation is presented as well, along with our reflection on limitations and implications. With this work we make two main contributions: (a) catalog of derived requirements for a digital IT Consulting platform, and (b) a component-level architecture proposal of how a digital IT consulting platform can be designed.

Research paper thumbnail of A verification exercise relating to specification styles in LOTOS

The design of complex distributed systems can be supported by a methodology where several, increa... more The design of complex distributed systems can be supported by a methodology where several, increasingly implementation-oriented, formal specifications are successively developed. The relative verification of such specifications is discussed in this memorandum using some example specifications in LOTOS. It is claimed that the adoption of common specification styles can simplify the verification task. Two congruence laws which are not contained in the LOTOS standard are presented.

Research paper thumbnail of Preface : 13th Open European Summer School and IFIP TC6.6 Workshop, EUNICE 2007 Enschede, The Netherlands, July 18-20, 2007 proceedings

Research paper thumbnail of Characterising the digital transformation of IT consulting services–Results from a systematic mapping study

IET Software, Jul 12, 2022

Currently, the digital transformation of the provisioning of IT consulting services to clients fo... more Currently, the digital transformation of the provisioning of IT consulting services to clients forces many companies to reinvent their business models. While the importance of digital transformation is well recognised, very little has been done until now to closely examine the concepts characterising this phenomenon in the domain of IT consulting. This paper aims at mapping out what is currently known in scientific literature about the digitalisation of IT consulting service provisioning and its characterising concepts and approaches. Analysing 20 selected articles, we identified 10 concepts characterising the digital IT consulting and 14 areas considered to be candidates for inclusion in the design of digital IT consulting services. Moreover, we found only one approach to the digitalisation of service provisioning that was empirically evaluated. We conclude that (i) the digital transformation is multifaceted and characterised through many aspects; (ii) digital IT consulting services are primarily explored from business perspective, while research of stakeholders' needs, technical requirements, and designs of relevant artefacts is scarce; (iii) while individual solutions and practices that worked in real-world contexts are reported, very little empirical evaluation was done. Finally, we reflected on the limitations and on the theoretical and practical implications of this work. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes.

Research paper thumbnail of Lotos Specification Style for OSI

Springer eBooks, 1995

The architecture of OSI is used to derive guidelines for writing LOTOS specifications of distribu... more The architecture of OSI is used to derive guidelines for writing LOTOS specifications of distributed systems. In particular, the architectural concepts that underlie service and protocol designs are examined in detail. For each of these concepts a representation in LOTOS is given. Examples are provided of how the LOTOS representations of the concepts are used in the construction of LOTOS specifications of service and protocol designs. The approach described in this paper is motivated by the need to produce distributed system specifications in a more consistent and productive fashion.

Research paper thumbnail of Towards model-driven service-oriented enterprise computing

Enterprise Information Systems, Aug 1, 2009

ABSTRACT The definition and management of access rules (e.g. to control access to business docume... more ABSTRACT The definition and management of access rules (e.g. to control access to business documents and business functions) is a fundamental task in any enterprise information system (EIS). While there exists considerable work on how to specify and represent ...

Research paper thumbnail of Using P3P in a web services-based context-aware application platform

Research paper thumbnail of Visual Description of Digital IT Consulting Services Using DITCOS-DN: Proposal and Evaluation of a Graphical Editor

Research paper thumbnail of What Industry Wants from Requirements Engineers in China?

Background] Publications on the professional occupation of Requirements Engineering (RE) reported... more Background] Publications on the professional occupation of Requirements Engineering (RE) reported on market demands for both RE and non-RE qualifications and indicated the state-of-the-practice of RE roles in industry. However, prior research was not from the perspective of the RE area in the Software Engineering Body of Knowledge (SWEBOK). Nor, they shed light on the industry needs of RE professionals in China. [Aims] This paper focused on RE-specific tasks and skills sought after in China, from the perspective of RE activities elaborated in SWEBOK. [Method] Using an empirical qualitative research method, we selected and analyzed 535 job ads from China's two largest job portals. Job titles and descriptions of these ads were analyzed to uncover RErelevant responsibilities in the categories of RE activities in SWEBOK as well as RE skills. [Results] We identified the qualifications, experience and skills demanded by Chinese employers. Specifically, we reported 23 RE tasks demanded in the 535 job ads, from the perspective of SWEBOK RE activities. [Conclusion] Our findings reveal that in China's job market, 'requirements engineer' is explicitly used as a title of job ads. Plus, around 78% of the selected job positions want the employees to perform tasks in requirements elicitation. Editing requirements specification is the most in-demand

Research paper thumbnail of An Information Security Architecture for Smart Cities

Lecture notes in business information processing, 2018

The growing use of ICT in public life has coerced the concept of smart cities. In a smart city, n... more The growing use of ICT in public life has coerced the concept of smart cities. In a smart city, numerous physical devices coupled with latest ICT technologies are used by city authorities to provide better services and infrastructure to its citizens. Smart cities have unique security challenges. Owing to the involvement of numerous stakeholders, information security breaches can have wide ranging, long-lasting consequences. The challenges of smart city information security have not received the attention they deserve. This paper combines threat analysis and enterprise architecture modelling to address and mitigate these challenges from a holistic perspective. An information security architecture is presented, which can help stakeholders of the smart city projects to build more secure smart cities.

Research paper thumbnail of On the design of application protocols

Page 1. On the Design of Application Protocols Marten van Sinderen CTIT Ph. D-thesis series No. 9... more Page 1. On the Design of Application Protocols Marten van Sinderen CTIT Ph. D-thesis series No. 95-04 PO Box 217 - 7500 AE Enschede - The Netherlands telephone +31-53-893779 / fax +31-53-333815 Centre for Telematics and Information Technology Page 2. ...

Research paper thumbnail of Challenges and solutions in enterprise computing

Enterprise Information Systems, Nov 1, 2008

Research paper thumbnail of CoolTeD: A tool for co-labeling and visual analysis of textual dataset

Science of Computer Programming, Apr 1, 2023

Research paper thumbnail of De applicatie laag

Research paper thumbnail of Generic Protocol Specification Structures and Constructs

Research paper thumbnail of Augmenting App Review with App Changelogs: An Approach for App Review Classification

Proceedings, Jul 10, 2019

Recent research on the automatic classification of app reviews either focused on grouping app rev... more Recent research on the automatic classification of app reviews either focused on grouping app reviews into categories relevant to software evolution, or employed app reviews as the only research data to improve app reviews classification. Although it was reported that app review classification can benefit from supplementing user reviews with the data from other sources, only a few studies employed app changelogs for this purpose. This paper explores how to augment app reviews with changelogs to improve the accuracy and performance of classifying functional and non-functional requirements in app reviews. Specifically, we propose AUG-AC as an approach to extract feature words from app changelogs and construct the augments for app reviews. Next, we designed a series of experiments to evaluate our approach, varying in the length of AC-based augments for app reviews. The results show that AUG-AC outperforms the existing method by using app changelogs as a source of data next to app reviews.

Research paper thumbnail of RoseMatcher: Identifying the impact of user reviews on app updates

Information & Software Technology, Sep 1, 2023

Context: The release planning of mobile apps has become an area of active research, with most stu... more Context: The release planning of mobile apps has become an area of active research, with most studies centering on app analysis through release notes in the Apple App Store and tracking user reviews via issue trackers. However, the correlation between these release notes and user reviews in App Store remains understudied. Objective: In this paper, we introduce RoseMatcher, a novel automatic approach to match relevant user reviews with app release notes and identify matched pairs with high confidence. Methods: We collected 944 release notes and 1,046,862 user reviews from 5 mobile apps in the Apple App Store as research data to evaluate the effectiveness and accuracy of RoseMatcher, and conducted deep content analysis on matched pairs. Results: Our evaluation shows that RoseMatcher can reach a hit ratio of 0.718 for identifying relevant matched pairs, and with the manual labeling and content analysis of 984 relevant pairs, we identify 8 roles that user reviews play in app updates according to the relationship between release notes and user reviews in the relevant matched pairs. Conclusions: Our findings indicate that both app development teams and users pay close attention to release notes and user reviews, with release notes typically addressing feature requests, bug reports, and complaints, and user reviews offering positive, negative, and constructive feedback. Overall, the study highlights the importance of the communication between app development teams and users in the release planning of mobile apps, with relevant reviews tending to be posed within a short period before and after the release of release notes, with the average time interval between the post time of release notes and user reviews being approximately one year.